Story image

Organisations not testing incident response plans – IBM Security

15 Apr 2019

IBM Security has announced the results of a global study exploring organisations’ preparedness when it comes to withstanding and recovering from a cyberattack.

The study, conducted by the Ponemon Institute on behalf of IBM, found that the majority of organisations surveyed are still unprepared to properly respond to cybersecurity incidents, with 77% of respondents indicating they do not have a cybersecurity incident response plan applied consistently across the enterprise.

While studies show that companies who can respond quickly and efficiently to contain a cyberattack within 30 days save over $1 million on the total cost of a data breach on average, shortfalls in proper cybersecurity incident response planning have remained consistent over the past four years of the study.

Of the organisations surveyed that do have a plan in place, more than half (54%) do not test their plans regularly, which can leave them less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.

The difficulty cybersecurity teams are facing in implementing a cybersecurity incident response plan has also impacted businesses’ compliance with the General Data Protection Regulation (GDPR).

Nearly half of respondents (46%) say their organisation has yet to realise full compliance with GDPR, even as the one-year anniversary of the legislation quickly approaches.   

“Failing to plan is a plan to fail when it comes to responding to a cybersecurity incident."

"These plans need to be stress tested regularly and need full support from the board to invest in the necessary people, processes and technologies to sustain such a programme,” says, IBM Resilient co-founder and product management vice president Ted Julian.

“When proper planning is paired with investments in automation, we see companies able to save millions of dollars during a breach.”  

Automation still emerging

For the first time, this year’s study measured the impact of automation on cyber resilience.

In the context of this research, automation refers to enabling security technologies that augment or replace human intervention in the identification and containment of cyber exploits or breaches. These technologies depend upon artificial intelligence, machine learning, analytics and orchestration.

When asked if their organisation leveraged automation, only 23% of respondents said they were significant users, whereas 77% reported their organisations only use automation moderately, insignificantly or not at all. 

Organisations with the extensive use of automation rate their ability to prevent (69% vs. 53%), detect (76% vs. 53%), respond (68% vs. 53%) and contain (74% vs. 49%) a cyberattack as higher than the overall sample of respondents.

According to the 2018 Cost of a Data Breach Study, the use of automation is a missed opportunity to strengthen cyber resilience, as organisations that fully deployed security automation saved $1.5 million on the total cost of a data breach, contrasted with organisations that did not leverage automation and realised a much higher total cost of a data breach. 

Skills gap still impacting cyber resilience

The cybersecurity skills gap appears to be further undermining cyber resilience, as organisations reported that a lack of staffing hindered their ability to properly manage resources and needs.

Survey participants stated they lack the headcount to properly maintain and test their incident response plans and are facing 10-20 open seats on cybersecurity teams. 

In fact, only 30% of respondents reported that staffing for cybersecurity is sufficient to achieve a high level of cyber resilience.

Furthermore, 75% of respondents rate their difficulty in hiring and retaining skilled cybersecurity personnel as moderately high to high. 

Adding to the skills challenge, nearly half of respondents (48%) said their organisation deploys too many separate security tools, ultimately increasing operational complexity and reducing visibility into overall security posture.

Privacy growing as a priority

Organisations are finally acknowledging that collaboration between privacy and cybersecurity teams can improve cyber resilience, with 62% indicating that aligning these teams is essential to achieving resilience.

Most respondents believe the privacy role is becoming increasingly important, especially with the emergence of new regulations like GDPR and the California Consumer Privacy Act, and are prioritising data protection when making IT buying decisions.

When asked what the top factor was in justifying cybersecurity spend, 56% of respondents said information loss or theft.

This rings especially true as consumers are demanding businesses do more to actively protect their data.

According to a recent survey by IBM, 78% of respondents say a company's ability to keep their data private is extremely important, and only 20% completely trust organisations they interact with to maintain the privacy of their data.

In addition, most respondents also reported having a privacy leader employed, with 73% stating they have a Chief Privacy Officer, further proving that data privacy has become a top priority in organisations.

Tech Data to distribute Nutanix backup solution in A/NZ
Tech Data will distribute HYCU Data Protection for Nutanix backup and recovery software to their network of partners across Australia and New Zealand.
Veeam releases v3 of its MS Office backup solution
One of Veeam’s most popular solutions, Backup for Office 365, has been upgraded again with greater speed, security and analytics.
Too many 'critical' vulnerabilities to patch? Tenable opts for a different approach
Tenable is hedging all of its security bets on the power of predictive, as the company announced general available of its Predictive Prioritisation solution within Tenable.io.
Safety solutions startup wins ‘radical generosity’ funding
Guardian Angel Security was one of five New Zealand businesses selected by 500 women (SheEO Activators) who contributed $1100 each.
Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.